Intrusion Detection Snort for the SnapGear SG565Router Sceenshot

Back to the SnapGear SG565

Screenshots from

SG565 - Snort Configuration Network Setup Network Setup DHCP Server Web Cache Shares QoS Traffic Shaping SIP Firewall Incoming Access Definitions Packet Filtering NAT Connection Tracking Intrusion Detection Access Control Antivirus Antispam VPN PPTP VPN Client PPTP VPN Server L2TP VPN Client L2TP VPN Server IPSec Port Tunnels System Date and Time Backup/Restore Users Management Diagnostics Advanced Help and Support Copyright (C) 1999-2008 Secure Computing Corp. All rights reserved. Snort Configuration IDB Snort IPS Snort Configuration Snort provides a wealth of rule based intrusion detection capabilities for your SnapGear unit. Snort inspects all incoming network packets and matches these against a number of rules which allow it to detect a wide range of potentially dangerous anomalies. Enabled Interface .elements ">Switch A .elements ">Wireless ">Speakeasy Bonded T1 (Port A4) ">Speakeasy Bonded T1* (Port B) Use less memory Snort has a number of different rule sets which can be enabled and disabled individually. Each additional rule set that is enabled provides more triggers for Snort to report upon and, in general, slows down Snort's performance and consequently the performance of this SnapGear unit. Rule set bad traffic exploit scan finger ftp telnet rpc rservices dos ddos dns tftp web (cgi) web (coldfusion) web (iis) web (frontpage) web (misc) web (client) web (php) sql x11 icmp netbios misc attack responses oracle mysql snmp email (smtp) email (imap) email (pop2) email (pop3) news (nntp) other ids web attacks backdoor shellcode policy pornography info icmp info virus chat multimedia p2p experimental Log results to database Database Type mysql Database Name Hostname Database port Sensor Name Username Password Confirm Password  
Home > Screenshots > SnapGear > SG565 > Intrusion Detection Snort